To use Cyware you must have cookies enabled. By Registering or Signing in, you agree to our Terms and Privacy Policy. You can also signup using Google Account. We will not use your credentials to import contacts or post anything on your account without your permission.For more info, please see Login FAQ.

All you Need to Know About IBM Z Mainframe

Every morning begins with a news of a breach in some global company. The reason being: there are several professional, organized attackers around the world who vie for sensitive information. The present unencrypted information that’s crunched in huge machines is a primary reason for umpteen data breaches that the globe witnesses. However, to tackle the menace, IBM has rolled up its sleeve and come with a new IBM Z mainframe that seeks to address cyberattacks which have compromised financial data.

Here’s everything you need to know about IBM Z.

Designed to encrypt

The IBM Z is devised keeping end-to-end encryption in mind. This wasn’t viable for other vendors earlier mainly because of the additional load on the operational costs and low processing power. IBM Z mainframes locks the data with 256-bit military-grade AES encryption, which is unbreakable with current technology. However, the IBM beast is believed to demonstrate a solid performance being capable of running up to several encrypted transactions per day.

A computing powerhouse

IBM Z shelters a dedicated hardware to encrypt every byte of data which eliminates the need for businesses to pick and choose what files to encrypt. The power-packed system runs at 5.2GHz and can support up to 2 million Docker containers, 1,000 concurrent NoSQL databases, and 12 billion encrypted transactions each day. In addition, to keep the system really secure, IBM machine also has robust breach detection system built-in, which would invalidate all the decryption keys until the probe ends.

Cybersecurity law compliant

IBM has unleashed its expertise to automate the compliance processes which are considered as bumps along the growth trajectory. By automating them, it would allow companies to exhibit that the data they keep is encrypted and safe. Also, importantly, the companies can leverage the secure machine’s abilities to comply with the new data protection laws, such as the European Union's General Data Protection Regulation (GDPR) and the U.S.'s Federal Financial Institutions Examination Council (FFIEC).

With these strong features the new IBM Z is all set to rule the server market once again. In addition, IBM also integrates with IBM Blockchain services enabling the product to stand out. Although, the present day security needs may compel enterprises to adopt the new product, IBM’s secrecy on the pricing will make it hard for organizations to judge at this point of time.

Who we are

Cyware is a first-of-its-kind, comprehensive cyber situational awareness platform, designed to help you stay informed about the latest happenings in the cyber world with expertly curated news stories and updates.

Our Technology

Let IBM's Watson Find the Right News For You

The cyber threat landscape is changing rapidly, and cybersecurity news has claimed its spot on the front pages in recent months. It's not easy to find the right information from tens of thousands of cyber news articles and feeds published every day. Our machine learning based curation engine brings you the most relevant cyber content based on your needs.

Receive Daily Cyber News in Your Inbox

From the latest cyber security trends and innovations to new malware, vulnerabilities and threat intelligence, we bring you the most up-to date and relevant cyber updates and news alerts.